SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is SSTP?
Use the net sh command to configure the proper ports for remote management.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Anew vpn protocol that uses SSL (port 443) for encryption.
By unbinding the DHCP protocol from the nic attached to the subnet.
2. Can Wireless profiles can be exported and imported using a flash drive?
WPA-Personal (uses a preshared key)
It improves performance
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Yes
3. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
4. What is Aero Snap?
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
Delegate permission by configuring the dacl of the zone file.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
5. How do you upgrade windows 7?
Enterprise Admins
Configure a GPO to modify the computers location to look for updates.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
By using the dnscmd /zoneexport command.
6. How can you removed a stale resource record from DNS?
Use the Programs and Features Control Panel applet to
Configure aging and scavenging.
Through a GPO.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
7. What does User Rights policy governs?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Who can shutdown a computer
By either using WSUS management console (server side targeting) or GPO (client side targeting).
8. What happens when 3rd party vendors create a new driver?
WPA2 and 802.1x but require EAP-TLS to be enable.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
It governs remote access and a user must meet the conditions of at least one of the policies.
9. What does dnscmd /zoneadd dsprimary do?
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Add an AD integrated zone
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
10. What is PSR.EXE?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
From the Network Policy Access Services role in system manager.
By running the Update Status summary report.
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
11. What are WIM files used for?
It create a report of which files will be migrated
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
4 (bits 49 - 52) /52 Allows for 16 regions.
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
12. Where are Applocker policies are configured?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Through a GPO under Application Control Policies in the Computer Security Settings Node.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Install Windows Installer Packages (.MSI) files. You can script the installation.
13. How do you configure IPSEC between two computers?
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
Use the Advanced Firewall to define Connection Security Rules.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
SP3
14. What does Windows ReadyBoost do?
15. What is an example of a exceptions to rule?
wbadmin.exe. This can backup critical files.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
16. What does Scanstate /EFS:COPYRAW do?
Migrates EFS encrypted files?
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
By using the dnscmd /zoneexport command.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
17. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Comes with the Windows Automated Installation Kit (WAIK)
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
The local security logs.
18. Where should you backup to automate System Image backups and maintain multiple images?
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Divide up a large WIM file into multiple smaller .SWM files
A network location.
19. What are soft disk quotas?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
Restrict the share permissions of the DFS root share.
Use dnscmd /zonerefresh.
They are monitored but not enforced. Users can exced there quota limit.
20. What does Internet Explorer store while you are surfing using InPrivate Browsing?
Use it to can backup certificates to a .PFX file that is password protected.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
21. What tool is used to manage shadowcopies?
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
vssadmin.exe. This can view previous version files as well.
22. What is DISM.EXE?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
23. How many bits are in the regional prefix?
DHCPv6 obtains additional configuration settigns.
4 (bits 49 - 52) /52 Allows for 16 regions.
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
24. What does Scanstate /p do?
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
25. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
IPV4 and IPV6
No
SSL
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
26. What does Cipher /K do?
Use it to generate an EFS user certificate
From the Network Policy Access Services role in system manager.
Us edit dnscmd /zoneupdatefromdns command.
Does not have
27. What is new in Windows User State Migration Tool (USMT) 4.0?
Modify/Create a GPO
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
By running the Update Status summary report.
Forward to another DNS server
28. What do RRAS/NPS policys govern?
Increase the SOA refresh interval parameter.
Se a capture filter based on the mac address of the problem PC.
It governs remote access and a user must meet the conditions of at least one of the policies.
It is the authentication header protocol and digitally sign packets but not encrypt them.
29. What OSs can IPV6 be uninstalled?
Who can shutdown a computer
No
By creating or modifying a wireless connection in Network and Sharing Center.
Windows XP and Server 2003.
30. How do you restore a System Image from backup?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Install Windows Installer Packages (.MSI) files. You can script the installation.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
31. What is a Subscription in event viewer?
Use SYNC Center
Deploy a secondary zone.
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Place unhealthy computers in a quarantined network and auto-remediate clients.
32. How do you restore individual files?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
DHCPv6 obtains additional configuration settigns.
Either from wbadmin or windows server backup.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
33. How do you setup Ready Boost?
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
34. Can Offline migration be performed on Windows 2000?
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
No
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
ISATAP - Teredo and 6to4
35. Where is scavaging configured?
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
On the properties of the DNS server in the DNS manager.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Default Programs Control Panel applet
36. How do you setup a DHCP server for redundancy?
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
A file that is loaded when a DNS server starts up and populate the root hints.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
37. What is System protection?
38. What does the Hosted Cache mode do?
Perform an offline migration
They are monitored but not enforced. Users can exced there quota limit.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
wbadmin.exe. This can backup critical files.
39. What does dnscmd /zoneadd primary do?
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
They are monitored but not enforced. Users can exced there quota limit.
Adds a file based zone
40. What is BCD?
Windows Aero was revised to be more touch-friendly.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
41. What are hard disk quotas?
they are enforced and will not allow a user to exceed the space limit.
Deploy a secondary zone.
WINRM QUICKCONFIG.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
42. What does the Resource Monitor display?
Use the Advanced Firewall to define Connection Security Rules.
Which processes currently consume a resource like processor utilization.
Extensive Authentication Protocol used in PPP authentication.
They must be configured with the ip addresses of the radius server.
43. What do NAP clients do?
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
44. What does DISM /Get-Drivers do?
Used to get a list of installed 3rd party drivers
Forward to another DNS server
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
45. What is another way to deploy an application compatibility database across multiple computers?
Use Safe Mode and then roll back the driver if it was recently updated.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
46. How do you prevent Forms Based Credentials from being saved?
Disable AutoComplete in Internet Explorer
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
47. What do wireless access point need to be configured with to to preform 802.1x authentication?
Use IPCONFIG or Status Details for the Network Connection.
They must be configured with the ip addresses of the radius server.
EAP protocol.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
48. What event viewer log is the Radius server (NPS) logs stored?
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
It governs remote access and a user must meet the conditions of at least one of the policies.
The local security logs.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
49. What requirements must your system must meet to use BranchCache?
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
It is the Microsoft SMB client for accessing shared network resources
50. What sites support Integrated Windows Authentication?
Extensive Authentication Protocol used in PPP authentication.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Only sites added to the local Intranet Zones
Set IE back to its default settings